Short Name |
RADIUS:USR-OF |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
RADIUS |
Keywords |
Username Buffer Overflow |
Release Date |
2005/07/11 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a know vulnerability against RADIUS Authentication Bypass protocol. Attackers can craft an overly long username, which can cause the Authentication, Authorization, and Accounting (AAA) process to bypass authentication. This can lead to a buffer overflow and remote execution of arbitrary code.
Cisco IOS Remote Authentication Dial In User Service (RADIUS) is prone to a remote authentication bypass vulnerability. The issue manifests when Cisco IOS is configured to employ AAA RADIUS authentication and is configured to use 'none' as a fallback method. A remote attacker may exploit this issue to bypass authentication and gain unauthorized access to the affected service.